PopojiCMS 2.0.1 contains an authenticated remote command execution vulnerability that allows administrative users to inject malicious PHP code through the metadata settings endpoint. Attackers can log in and modify the meta content to create a web shell that executes arbitrary system commands through a GET parameter.
Metrics
Affected Vendors & Products
References
History
Thu, 11 Dec 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 11 Dec 2025 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Popojicms
Popojicms popojicms |
|
| Vendors & Products |
Popojicms
Popojicms popojicms |
Wed, 10 Dec 2025 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | PopojiCMS 2.0.1 contains an authenticated remote command execution vulnerability that allows administrative users to inject malicious PHP code through the metadata settings endpoint. Attackers can log in and modify the meta content to create a web shell that executes arbitrary system commands through a GET parameter. | |
| Title | PopojiCMS 2.0.1 Remote Command Execution via Authenticated Metadata Settings | |
| Weaknesses | CWE-94 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: VulnCheck
Published: 2025-12-10T21:15:07.958Z
Updated: 2025-12-11T15:42:27.502Z
Reserved: 2025-12-10T14:35:24.455Z
Link: CVE-2024-58284
Updated: 2025-12-11T15:42:19.572Z
Status : Received
Published: 2025-12-10T22:16:20.420
Modified: 2025-12-11T16:16:21.663
Link: CVE-2024-58284
No data.